Article

标题 文件
卷 52, 编号 8 (2018) An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code PDF
(Eng)
Demidov R., Pechenkin A., Zegzhda P.
卷 52, 编号 8 (2018) Modeling the Dissemination of Information Threats in Social Media PDF
(Eng)
Falcone I., Gatsenko O.
卷 52, 编号 8 (2018) Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model PDF
(Eng)
Demidov R., Zegzhda P., Kalinin M.
卷 52, 编号 8 (2018) Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security PDF
(Eng)
Demidov R., Pechenkin A., Zegzhda P., Kalinin M.
卷 52, 编号 8 (2018) Detection of Abnormal Traffic in Dynamic Computer Networks with Mobile Consumer Devices PDF
(Eng)
Platonov V., Semenov P.
卷 52, 编号 8 (2018) The Use of Adjacency Series for Recognition of Prefractal Graphs in Assessing VANET Cybersecurity PDF
(Eng)
Zegzhda P., Ivanov D., Moskvin D., Ivanov A.
卷 52, 编号 8 (2018) Hierarchical Software-Defined Security Management for Large-Scale Dynamic Networks PDF
(Eng)
Kalinin M., Krundyshev V., Rezedinova E., Reshetov D.
卷 52, 编号 8 (2018) Detection of Threats in Cyberphysical Systems Based on Deep Learning Methods Using Multidimensional Time Series PDF
(Eng)
Kalinin M., Lavrova D., Yarmak A.
卷 52, 编号 8 (2018) A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems PDF
(Eng)
Zegzhda P., Poltavtseva M., Pechenkin A., Lavrova D., Zaitseva E.
卷 52, 编号 8 (2018) Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation PDF
(Eng)
Lavrova D., Alekseev I., Shtyrkina A.
卷 52, 编号 8 (2018) Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks PDF
(Eng)
Zegzhda P., Lavrova D., Shtyrkina A.
卷 52, 编号 8 (2018) A Distributed Intrusion Detection System with Protection from an Internal Intruder PDF
(Eng)
Shterenberg S., Poltavtseva M.
卷 52, 编号 8 (2018) Using Neural Networks to Detect Internal Intruders in VANETs PDF
(Eng)
Ovasapyan T., Moskvin D., Kalinin M.
卷 52, 编号 8 (2018) Ensuring Secure Data Input/Output Operations for SGX ENCLAVE PDF
(Eng)
Zegzhda D., Usov E., Nikol’skii A., Pavlenko E.
卷 52, 编号 8 (2018) Security Provision in Wireless Sensor Networks on the Basis of the Trust Model PDF
(Eng)
Ovasapyan T., Ivanov D.
卷 52, 编号 8 (2018) CRC Error Probability under Batch Random Noise PDF
(Eng)
Baranov A., Baranov P.
卷 52, 编号 8 (2018) Implementation of Mandatory Access Control in Distributed Systems PDF
(Eng)
Belim S., Belim S.
卷 52, 编号 8 (2018) Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network PDF
(Eng)
Dakhnovich A., Zegzhda D., Moskvin D.
卷 52, 编号 8 (2018) Modification of Preliminary Blom’s Key Distribution Scheme Taking into Account Simplex Channels PDF
(Eng)
Belim S., Belim S.
卷 52, 编号 8 (2018) Use of Statistical Processing of Reference Images in Biometric Authentication Systems PDF
(Eng)
Los’ V., Ross G., Tyshuk E.
卷 52, 编号 8 (2018) Architecture of the Protected Cloud Data Storage Using Intel SGX Technology PDF
(Eng)
Usov E., Nikol’skii A., Pavlenko E., Zegzhda D.
卷 52, 编号 8 (2018) Digital Manufacturing Security Indicators PDF
(Eng)
Zegzhda D., Pavlenko E.
卷 52, 编号 8 (2018) Using Undeniable Signature on Elliptic Curves to Verify Servers in Outsourced Computations PDF
(Eng)
Aleksandrova E., Shkorkina E.
卷 52, 编号 8 (2018) Application of Systems Theory Laws for Investigating Information Security Problems PDF
(Eng)
Volkova V., Chernyi Y.
卷 52, 编号 8 (2018) Development of a Heuristic Mechanism for Detection of Malware Programs Based on Hidden Markov Models PDF
(Eng)
Kozachok A.
126 - 150 的 463 信息 << < 1 2 3 4 5 6 7 8 9 10 > >> 
##common.cookie##